Issued Patents All Time
Showing 25 most recent of 92 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12423426 | System and method for tracing cloud computing environment deployments to code objects utilizing unique fingerprints | Assaf Segal, Amir Lande Blau, Tal Gilady, Arnon Trabelsi | 2025-09-23 |
| 12395488 | Techniques for analyzing external exposure in cloud environments | Matilda LIDGI, Shai Keren, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK | 2025-08-19 |
| 12395489 | Techniques for active inspection of cloud computing applications utilizing optical character recognition | Matilda LIDGI, Shai Keren, Raaz HERZBERG, Roy REZNIK, Avihai Berkovitz +1 more | 2025-08-19 |
| 12395503 | System and method for detecting sensitive data in active inspection of cloud computing resources | Matilda LIDGI, Shai Keren, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK | 2025-08-19 |
| 12380223 | Techniques for risk and constraint-based inspection | Yaniv Shaked, Shahar Rand, Eric Abramov, Elad Gabay, Yinon COSTICA | 2025-08-05 |
| 12381939 | System and method for analyzing network objects in a cloud environment | Shai Keren, Daniel Hershko SHEMESH, Roy REZNIK, Avihai Berkovitz | 2025-08-05 |
| 12375499 | System and method for detecting lateral movement using SSH private keys | Avi Tal LICHTENSTEIN, Yinon COSTICA | 2025-07-29 |
| 12361140 | Architecture of a multi-cloud inspector for any compute type | Yaniv Shaked, Gal KOZOSHNIK, Roy REZNIK, Yarin Miran | 2025-07-15 |
| 12333010 | System and method for generating a partitioned view of a security graph in a cloud computing environment | Avihai Berkovitz, Raaz HERZBERG, Roy REZNIK, Shai Keren, Yinon COSTICA | 2025-06-17 |
| 12287899 | Techniques for detecting sensitive data in cloud computing environments utilizing cloning | Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK, Moran Cohen, Yaniv Shaked +4 more | 2025-04-29 |
| 12284195 | Techniques for detecting cloud identity misuse leveraging runtime context | Alon SCHINDEL, Shir Tamari, Ron Cohen | 2025-04-22 |
| 12278835 | System and method for tracing cloud computing environment deployments to code objects | Assaf Segal, Amir Lande Blau, Tal Gilady, Arnon Trabelsi | 2025-04-15 |
| 12278825 | System and method for cybersecurity threat detection utilizing static and runtime data | Aviel FOGEL, Udi REITBLAT, Alon SCHINDEL, Roy REZNIK, Yinon COSTICA | 2025-04-15 |
| 12277216 | Techniques for improved virtual instance inspection utilizing disk cloning | Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Yinon COSTICA | 2025-04-15 |
| 12277532 | System and method for agentless application inventory detection | Mattan SHALEV, Yaniv Shaked, Gal KOZOSHNIK, Omri Kornblau, Roy REZNIK +1 more | 2025-04-15 |
| 12278897 | System and method for disk inspection utilizing disk cloning techniques | Daniel Hershko SHEMESH, Yarin Miran, Roy REZNIK, Yinon COSTICA | 2025-04-15 |
| 12271490 | Unified inspection techniques based on abstracted compute type | Yaniv Shaked, Roy REZNIK, Yarin Miran, Moran Cohen | 2025-04-08 |
| 12273258 | System and method for determining code reachability in a networked computing environment | Assaf Segal, Shir Tamari, Arnon Trabelsi, Amir Lande Blau | 2025-04-08 |
| 12273412 | System and method for analyzing network objects in a cloud environment | Shai Keren, Daniel Hershko SHEMESH, Roy REZNIK, Avihai Berkovitz | 2025-04-08 |
| 12273358 | System and method for detecting lateral movement using cloud access keys | Avi Tal LICHTENSTEIN, Daniel Hershko SHEMESH | 2025-04-08 |
| 12273359 | Lateral movement analysis using certificate private keys | Avi Tal LICHTENSTEIN, Yinon COSTICA | 2025-04-08 |
| 12273357 | System and method for detecting lateral movement using SSH private keys | Avi Tal LICHTENSTEIN, Yinon COSTICA | 2025-04-08 |
| 12273373 | System and method for software service cybersecurity remediation | Or Tzabary | 2025-04-08 |
| 12267326 | Techniques for detecting resources without authentication using exposure analysis | Matilda LIDGI, Shai Keren, Raaz HERZBERG, Avi Tal LICHTENSTEIN, Roy REZNIK | 2025-04-01 |
| 12261877 | Detecting malware infection path in a cloud computing environment utilizing a security graph | Elad Gabay, Yaniv Shaked, Alon SCHINDEL, Roy REZNIK | 2025-03-25 |